Oracul Analytics
  • Welcome
  • Products
    • Oracul Analytics System
    • Oracul Deep Analytics
    • Oracul Foundation Trading
    • Oracul Token Security & Manipulation Defense
  • Metrics Guide
    • General Information
    • Emission Distribution
    • Holder & Balance Dynamics
    • Public & Non-Public Whales
    • Top Profitable Wallets
    • Holder Portfolios
    • On-chain Chart & Social Activity Index
    • Holder Behaviour (Speedometers)
    • Entry Score
    • Fear & Greed Index
    • Growth Backing
    • Tokenomics & Vesting
  • Cases and examples
    • Wintermute Hack (September 2022 — $160M)
    • Ronin Bridge Hack ($620M)
    • Wormhole Bridge Exploit ($320M)
  • Technologies
    • GPT-based Time Series Forecasting
    • Graph Attention Networks for Entity Classification
    • Zero-Shot Wallet Behavior Classification
    • Vector Database for Real-time Similarity Search
    • Fine-tuned Foundation Models for Market Intelligence
  • Safety
  • FAQ
  • Roadmap
  • Contacts and offers
Powered by GitBook
On this page
  1. Cases and examples

Wormhole Bridge Exploit ($320M)

Nine days before the breach, Oracul identified testing of similar vulnerabilities on alternative bridge protocols. 36 hours before the attack, we noticed transactions mimicking verification procedures and rare function calls not typical for standard smart contract interactions.

These events helped us train Oracul to recognize subtle red flags in the blockchain environment. Our current detection models are shaped by such cases and continue to evolve with every anomaly processed.

PreviousRonin Bridge Hack ($620M)NextTechnologies

Last updated 2 months ago

Page cover image